- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Aaron Nicodemus2022-08-23T22:13:00
A former cybersecurity executive at Twitter has blown the whistle on his observations of systemic data security lapses at the company, undercounting of fake accounts, and how the social media platform could be manipulated by foreign intelligence services.
Peiter “Mudge” Zatko, Twitter’s former head of security, sent a 200-page disclosure to Congress and several regulatory agencies in July outlying the alleged problems in detail, according to reports Tuesday by CNN and theWashington Post.
Zatko said he was fired by Twitter in January after he shared his concerns internally with management, including Chief Executive Parag Agrawal, who was once the company’s chief technology officer.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2023-03-08T22:40:00Z By Aaron Nicodemus
The Consumer Financial Protection Bureau and National Labor Relations Board pledged to share information regarding instances of improper employer use of surveillance tools and the sale of employees’ personal information.
2022-12-28T18:26:00Z By Kyle Brasseur
The Irish Data Protection Commission is investigating whether Twitter violated the European Union’s General Data Protection Regulation regarding a data breach alleged to have affected 5.4 million users.
2022-12-01T14:49:00Z By Jaclyn Jaeger
Senior executive shakeups, mass employee layoffs and resignations, major advertisers halting their ads—Elon Musk’s acquisition of Twitter provides a case study in leadership mismanagement for the ages.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud